Abstract
Public key cryptography can only be used in practice if users trust the authenticity of public keys. In this chapter we explain models and infrastructures that allow us to establish trust in the authenticity of public keys.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
CAcert – root keys, http://www.cacert.org/index.php?id=3
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, OpenPGP message format, in IETF Request for Comments, 4880, Nov 2007
EBCA – TeleTrusT European Bridge CA, https://www.ebca.de/en/
GNU Privacy Guard, http://www.gnupg.org/
J. Jonczy, M. Wüthrich, R. Haenni, A probabilistic trust model for GnuPG, in Proceedings of the 23rd Chaos Communication Congress, 23C3, Berlin, pp. 61–66, 2006
The European Telecommunications Standards Institute (ETSI), Electronic signatures and infrastructures (ESI); Provision of harmonized trust-service status information. ETSI TS 102 231 V3.1.2, Dec 2009
The International PGP Home Page, http://www.pgpi.org/
T. Ylonen, C. Lonvick, The secure shell (SSH) protocol architecture, in IETF Request for Comments, 4251, Jan 2006
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Trust Models. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)